Action not permitted
Modal body text goes here.
cve-2021-4024
Vulnerability from cvelistv5
Published
2021-12-23 19:48
Modified
2024-08-03 17:16
Severity ?
EPSS score ?
Summary
A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:16:03.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675%2C" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/containers/podman/releases/tag/v3.4.3" }, { "name": "FEDORA-2021-6bd024d2a7", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "podman", "vendor": "n/a", "versions": [ { "status": "affected", "version": "podman 3.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200, CWE-346", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-08T02:06:09", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675%2C" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/containers/podman/releases/tag/v3.4.3" }, { "name": "FEDORA-2021-6bd024d2a7", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-4024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "podman", "version": { "version_data": [ { "version_value": "podman 3.4.3" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200, CWE-346" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675,", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675," }, { "name": "https://github.com/containers/podman/releases/tag/v3.4.3", "refsource": "MISC", "url": "https://github.com/containers/podman/releases/tag/v3.4.3" }, { "name": "FEDORA-2021-6bd024d2a7", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-4024", "datePublished": "2021-12-23T19:48:45", "dateReserved": "2021-11-26T00:00:00", "dateUpdated": "2024-08-03T17:16:03.464Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-4024\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2021-12-23T20:15:12.210\",\"lastModified\":\"2023-11-07T03:40:06.607\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un fallo en podman. La funci\u00f3n \\\"podman machine\\\" (usada para crear y administrar la m\u00e1quina virtual Podman que contiene un proceso Podman) genera un proceso \\\"gvproxy\\\" en el sistema anfitri\u00f3n. La API \\\"gvproxy\\\" es accesible en el puerto 7777 en todas las direcciones IP del host. Si ese puerto est\u00e1 abierto en el firewall del host, un atacante puede potencialmente usar la API \\\"gvproxy\\\" para reenviar puertos en el host a puertos en la VM, haciendo que los servicios privados en la VM sean accesibles a la red. Este problema tambi\u00e9n podr\u00eda ser usado para interrumpir los servicios del host reenviando todos los puertos a la VM\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.4},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"},{\"lang\":\"en\",\"value\":\"CWE-346\"}]},{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:podman_project:podman:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3.0\",\"versionEndExcluding\":\"3.4.3\",\"matchCriteriaId\":\"18FEB567-718C-45A5-98E3-1481BE15A306\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2026675%2C\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/containers/podman/releases/tag/v3.4.3\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3/\",\"source\":\"secalert@redhat.com\"}]}}" } }
gsd-2021-4024
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-4024", "description": "A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM.", "id": "GSD-2021-4024", "references": [ "https://www.suse.com/security/cve/CVE-2021-4024.html", "https://security.archlinux.org/CVE-2021-4024", "https://access.redhat.com/errata/RHSA-2022:7954" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-4024" ], "details": "A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM.", "id": "GSD-2021-4024", "modified": "2023-12-13T01:23:11.572441Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-4024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "podman", "version": { "version_data": [ { "version_value": "podman 3.4.3" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200, CWE-346" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675,", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675," }, { "name": "https://github.com/containers/podman/releases/tag/v3.4.3", "refsource": "MISC", "url": "https://github.com/containers/podman/releases/tag/v3.4.3" }, { "name": "FEDORA-2021-6bd024d2a7", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3/" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=v3.3.0 \u003cv3.4.3", "affected_versions": "All versions starting from 3.3.0 before 3.4.3", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2022-03-01", "description": "A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM.", "fixed_versions": [ "v3.4.3" ], "identifier": "CVE-2021-4024", "identifiers": [ "CVE-2021-4024" ], "not_impacted": "", "package_slug": "go/github.com/containers/podman", "pubdate": "2021-12-23", "solution": "Upgrade to version 3.4.3 or above.", "title": "Exposure of Sensitive Information to an Unauthorized Actor", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-4024", "https://bugzilla.redhat.com/show_bug.cgi?id=2026675,", "https://github.com/containers/podman/releases/tag/v3.4.3" ], "uuid": "b3384278-db83-41d6-ab1f-a5feb79d1c42", "versions": [ { "commit": { "sha": "066cee129d02ce19e65bb238cf9543a92b8e8893", "tags": [ "v3.3.0" ], "timestamp": "20210820174723" }, "number": "v3.3.0" }, { "commit": { "sha": "1f8cb55784a8a8fd65f9b47b05ef22526f9698ce", "tags": [ "v3.4.3" ], "timestamp": "20211206205455" }, "number": "v3.4.3" } ] }, { "affected_range": "\u003c3.4.3", "affected_versions": "All versions before 3.4.3", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-346", "CWE-937" ], "date": "2022-01-06", "description": "A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM.", "fixed_versions": [ "3.4.3" ], "identifier": "CVE-2021-4024", "identifiers": [ "GHSA-3cf2-x423-x582", "CVE-2021-4024" ], "not_impacted": "All versions starting from 3.4.3", "package_slug": "go/github.com/containers/podman/v3", "pubdate": "2022-01-06", "solution": "Upgrade to version 3.4.3 or above.", "title": "Origin Validation Error", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-4024", "https://github.com/containers/podman/releases/tag/v3.4.3", "https://github.com/advisories/GHSA-3cf2-x423-x582" ], "uuid": "d817f3a7-bfa7-4386-86cd-886f476451f3" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:podman_project:podman:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.4.3", "versionStartIncluding": "3.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-4024" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" }, { "lang": "en", "value": "CWE-346" }, { "lang": "en", "value": "CWE-200" }, { "lang": "en", "value": "CWE-346" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675,", "refsource": "MISC", "tags": [ "Broken Link", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675," }, { "name": "https://github.com/containers/podman/releases/tag/v3.4.3", "refsource": "MISC", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/containers/podman/releases/tag/v3.4.3" }, { "name": "FEDORA-2021-6bd024d2a7", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5 } }, "lastModifiedDate": "2022-03-01T20:03Z", "publishedDate": "2021-12-23T20:15Z" } } }
ghsa-3cf2-x423-x582
Vulnerability from github
Published
2022-01-06 21:12
Modified
2022-02-09 18:28
Severity ?
Summary
Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman
Details
A flaw was found in podman. The podman machine
function (used to create and manage Podman virtual machine containing a Podman process) spawns a gvproxy
process on the host system. The gvproxy
API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the gvproxy
API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/containers/podman/v3" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.4.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-4024" ], "database_specific": { "cwe_ids": [ "CWE-200", "CWE-346" ], "github_reviewed": true, "github_reviewed_at": "2022-01-05T17:44:04Z", "nvd_published_at": "2021-12-23T20:15:00Z", "severity": "MODERATE" }, "details": "A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM.", "id": "GHSA-3cf2-x423-x582", "modified": "2022-02-09T18:28:05Z", "published": "2022-01-06T21:12:50Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4024" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675," }, { "type": "PACKAGE", "url": "https://github.com/containers/podman" }, { "type": "WEB", "url": "https://github.com/containers/podman/releases/tag/v3.4.3" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "type": "CVSS_V3" } ], "summary": "Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman" }
rhsa-2022_7954
Vulnerability from csaf_redhat
Published
2022-11-15 13:20
Modified
2024-11-24 20:40
Summary
Red Hat Security Advisory: podman security and bug fix update
Notes
Topic
An update for podman is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* podman: podman machine spawns gvproxy with port bound to all IPs (CVE-2021-4024)
* podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)
* containers/storage: DoS via malicious image (CVE-2021-20291)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for podman is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nSecurity Fix(es):\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n\n* podman: podman machine spawns gvproxy with port bound to all IPs (CVE-2021-4024)\n\n* podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)\n\n* containers/storage: DoS via malicious image (CVE-2021-20291)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7954", "url": "https://access.redhat.com/errata/RHSA-2022:7954" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index" }, { "category": "external", "summary": "1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "1919050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050" }, { "category": "external", "summary": "1939485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939485" }, { "category": "external", "summary": "1972303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972303" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "2026675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675" }, { "category": "external", "summary": "2040379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040379" }, { "category": "external", "summary": "2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "2081349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081349" }, { "category": "external", "summary": "2088116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088116" }, { "category": "external", "summary": "2092798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092798" }, { "category": "external", "summary": "2097694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097694" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7954.json" } ], "title": "Red Hat Security Advisory: podman security and bug fix update", "tracking": { "current_release_date": "2024-11-24T20:40:44+00:00", "generator": { "date": "2024-11-24T20:40:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:7954", "initial_release_date": "2022-11-15T13:20:30+00:00", "revision_history": [ { "date": "2022-11-15T13:20:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-15T13:20:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:40:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "podman-2:4.2.0-3.el9.src", "product": { "name": "podman-2:4.2.0-3.el9.src", "product_id": "podman-2:4.2.0-3.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-3.el9?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "podman-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-2:4.2.0-3.el9.aarch64", "product_id": "podman-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-gvproxy-2:4.2.0-3.el9.aarch64", "product_id": "podman-gvproxy-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-plugins-2:4.2.0-3.el9.aarch64", "product_id": "podman-plugins-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-remote-2:4.2.0-3.el9.aarch64", "product_id": "podman-remote-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-tests-2:4.2.0-3.el9.aarch64", "product_id": "podman-tests-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-debugsource-2:4.2.0-3.el9.aarch64", "product_id": "podman-debugsource-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "product_id": "podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-debuginfo-2:4.2.0-3.el9.aarch64", "product_id": "podman-debuginfo-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "product_id": "podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "product_id": "podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "podman-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-2:4.2.0-3.el9.ppc64le", "product_id": "podman-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-gvproxy-2:4.2.0-3.el9.ppc64le", "product_id": "podman-gvproxy-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-plugins-2:4.2.0-3.el9.ppc64le", "product_id": "podman-plugins-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-remote-2:4.2.0-3.el9.ppc64le", "product_id": "podman-remote-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-tests-2:4.2.0-3.el9.ppc64le", "product_id": "podman-tests-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-debugsource-2:4.2.0-3.el9.ppc64le", "product_id": "podman-debugsource-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "product_id": "podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-debuginfo-2:4.2.0-3.el9.ppc64le", "product_id": "podman-debuginfo-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "product_id": "podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "product_id": "podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "podman-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-2:4.2.0-3.el9.x86_64", "product_id": "podman-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-gvproxy-2:4.2.0-3.el9.x86_64", "product_id": "podman-gvproxy-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-plugins-2:4.2.0-3.el9.x86_64", "product_id": "podman-plugins-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-remote-2:4.2.0-3.el9.x86_64", "product_id": "podman-remote-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-tests-2:4.2.0-3.el9.x86_64", "product_id": "podman-tests-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-debugsource-2:4.2.0-3.el9.x86_64", "product_id": "podman-debugsource-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "product_id": "podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-debuginfo-2:4.2.0-3.el9.x86_64", "product_id": "podman-debuginfo-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "product_id": "podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "product_id": "podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "podman-2:4.2.0-3.el9.s390x", "product": { "name": "podman-2:4.2.0-3.el9.s390x", "product_id": "podman-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-3.el9.s390x", "product": { "name": "podman-gvproxy-2:4.2.0-3.el9.s390x", "product_id": "podman-gvproxy-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-3.el9.s390x", "product": { "name": "podman-plugins-2:4.2.0-3.el9.s390x", "product_id": "podman-plugins-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-3.el9.s390x", "product": { "name": "podman-remote-2:4.2.0-3.el9.s390x", "product_id": "podman-remote-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-3.el9.s390x", "product": { "name": "podman-tests-2:4.2.0-3.el9.s390x", "product_id": "podman-tests-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-3.el9.s390x", "product": { "name": "podman-debugsource-2:4.2.0-3.el9.s390x", "product_id": "podman-debugsource-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "product_id": "podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-3.el9.s390x", "product": { "name": "podman-debuginfo-2:4.2.0-3.el9.s390x", "product_id": "podman-debuginfo-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "product_id": "podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "product": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "product_id": "podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "podman-docker-2:4.2.0-3.el9.noarch", "product": { "name": "podman-docker-2:4.2.0-3.el9.noarch", "product_id": "podman-docker-2:4.2.0-3.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@4.2.0-3.el9?arch=noarch\u0026epoch=2" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-3.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src" }, "product_reference": "podman-2:4.2.0-3.el9.src", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-debuginfo-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-debuginfo-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-debuginfo-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-debuginfo-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-debugsource-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-debugsource-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-debugsource-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-debugsource-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-2:4.2.0-3.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch" }, "product_reference": "podman-docker-2:4.2.0-3.el9.noarch", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-gvproxy-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-gvproxy-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-gvproxy-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-gvproxy-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-plugins-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-plugins-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-plugins-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-plugins-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-remote-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-remote-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-remote-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-remote-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-tests-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-tests-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-tests-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-tests-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28851", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913333" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28851" }, { "category": "external", "summary": "RHBZ#1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:20:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension" }, { "cve": "CVE-2020-28852", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913338" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28852" }, { "category": "external", "summary": "RHBZ#1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:20:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag" }, { "cve": "CVE-2021-4024", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-11-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2026675" } ], "notes": [ { "category": "description", "text": "A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: podman machine spawns gvproxy with port bound to all IPs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4024" }, { "category": "external", "summary": "RHBZ#2026675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4024", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4024" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4024", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4024" } ], "release_date": "2021-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:20:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: podman machine spawns gvproxy with port bound to all IPs" }, { "cve": "CVE-2021-20199", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919050" } ], "notes": [ { "category": "description", "text": "A flaw was found in podman. Rootless containers receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts) which impact containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: Remote traffic to rootless containers is seen as orginating from localhost", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect Podman prior to version 1.8.0. Podman shipped in the following products are therefore not affected:\n\n* Red Hat Enterprise Linux 7 Extras\n* Red Hat Enterprise Linux 8 Container Tools stream 1.0\n* Red Hat Enterprise Linux 8 Container Tools stream 2.0\n* OpenShift Container Platform 3.11\n* OpenShift Container Platform 4.1 to 4.5", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20199" }, { "category": "external", "summary": "RHBZ#1919050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20199", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20199" } ], "release_date": "2021-01-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:20:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" }, { "category": "workaround", "details": "Configure containerized applications to require authentication for connections from all sources, including localhost.", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: Remote traffic to rootless containers is seen as orginating from localhost" }, { "acknowledgments": [ { "names": [ "Aviv Sasson" ], "organization": "Palo Alto Networks" } ], "cve": "CVE-2021-20291", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "discovery_date": "2021-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1939485" } ], "notes": [ { "category": "description", "text": "A deadlock vulnerability was found in `github.com/containers/storage`. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "containers/storage: DoS via malicious image", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability was first exposed in v1.23.8 of containers/storage (and subsequently fixed in v1.28.1) with this git commit [1].\n\n* In OpenShift Container Platform (OCP) only 4.7 contains a version of CRI-O (and openshift/ose-docker-builder) which uses a vulnerable version of containers/storage. Subsequently this has been addressed in OCP 4.7.7.\n\n* Red Hat Quay quay-builder-container is not affected because it uses a version of github.com/containers/storage earlier than v1.23.8\n\n* Red Hat Openshift Virtualization is not affected because all containers depending on github.com/containers/storage use a version earlier than v1.23.8\n\n* For Red Hat OpenStack Platform, because containers/storage is not directly used by the director-operator, no update will be provided at this time for the operator containers.\n\n[1] - https://github.com/containers/storage/blob/e9989a949a0d2c32fa82d3ff1076e33cfec58cb9/layers.go#L1332", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20291" }, { "category": "external", "summary": "RHBZ#1939485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939485" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20291", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20291" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20291", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20291" }, { "category": "external", "summary": "https://unit42.paloaltonetworks.com/cve-2021-20291/", "url": "https://unit42.paloaltonetworks.com/cve-2021-20291/" } ], "release_date": "2021-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:20:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containers/storage: DoS via malicious image" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:20:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:20:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2022-27191", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064702" } ], "notes": [ { "category": "description", "text": "A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crash in a golang.org/x/crypto/ssh server", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the vulnerable golang.org/x/crypto/ssh package is bundled in many components. The affected code is in the SSH server portion that is not used, hence the impact by this vulnerability is reduced. Additionally the OCP installer components, that also bundle vulnerable golang.org/x/crypto/ssh package, are used only during the cluster installation process, hence for already deployed and running OCP clusters the installer components are considered as affected by this vulnerability but not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27191" }, { "category": "external", "summary": "RHBZ#2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ", "url": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:20:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crash in a golang.org/x/crypto/ssh server" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.